Seccion 1 Flashcards

(37 cards)

1
Q

What is the main goal of Information Security?

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Information Systems Security.

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Confidentiality in the context of the CIA Triad?

A

Ensures information is accessible only to authorized personnel (e.g., encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Integrity ensure?

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of Availability?

A

Ensures information and resources are accessible when needed (e.g., redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Non-Repudiation.

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the Triple A’s of Security.

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between Authentication and Authorization?

A

Authentication verifies the identity of a user or system; Authorization determines actions or resources an authenticated user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify the categories of Security Controls.

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of Security Controls?

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Zero Trust Model?

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Control Plane in the Zero Trust Model include?

A
  • Adaptive identity
  • Threat scope reduction
  • Policy-driven access control
  • Secured zones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Threat in the context of cybersecurity.

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Vulnerability?

A

Any weakness in the system design or implementation

17
Q

Where do threats and vulnerabilities intersect?

A

That is where the risk to your enterprise systems and networks lies

18
Q

What is Risk Management?

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

19
Q

What are the five basic methods to ensure Confidentiality?

A
  • Encryption
  • Access Controls
  • Data Masking
  • Physical Security Measures
  • Training and Awareness
20
Q

What does Integrity ensure?

A

Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual

21
Q

List the methods used to maintain Integrity.

A
  • Hashing
  • Digital Signatures
  • Checksums
  • Access Controls
  • Regular Audits
22
Q

What is the importance of Availability in cybersecurity?

A

Ensures that information, systems, and resources are accessible and operational when needed by authorized users

23
Q

Define Redundancy in the context of Availability.

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

24
Q

What are the types of Redundancy to consider in system design?

A
  • Server Redundancy
  • Data Redundancy
  • Network Redundancy
  • Power Redundancy
25
What is the role of Digital Signatures in Non-repudiation?
Provide undeniable proof in the world of digital transactions
26
What are the five commonly used authentication methods?
* Something you know (Knowledge Factor) * Something you have (Possession Factor) * Something you are (Inherence Factor) * Something you do (Action Factor) * Somewhere you are (Location Factor)
27
What is Multi-Factor Authentication (MFA)?
Security process that requires users to provide multiple methods of identification to verify their identity
28
What is the purpose of Accounting in security?
Ensures all user activities during a communication or transaction are properly tracked and recorded
29
List the types of technologies used for Accounting.
* Syslog Servers * Network Analysis Tools * Security Information and Event Management (SIEM) Systems
30
What are the four broad categories of Security Controls?
* Technical Controls * Managerial Controls * Operational Controls * Physical Controls
31
What are the six basic types of Security Controls?
* Preventive Controls * Deterrent Controls * Detective Controls * Corrective Controls * Compensating Controls * Directive Controls
32
What is Gap Analysis?
Process of evaluating the differences between an organization's current performance and its desired performance
33
What are the two basic types of Gap Analysis?
* Technical Gap Analysis * Business Gap Analysis
34
What does the Plan of Action and Milestones (POA&M) outline?
Specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task
35
What does the Control Plane encompass in Zero Trust architecture?
* Adaptive Identity * Threat Scope Reduction * Policy-Driven Access Control * Secured Zones
36
What is the role of the Policy Engine in the Control Plane?
Cross-references the access request with its predefined policies
37
Define the Data Plane in Zero Trust architecture.
Consists of the subject/system and policy enforcement point where access decisions are executed